Volume 3 Number 6 June 2010
From the Desk of David Badertscher
Home Personal Computer (PC) Maintenance for Windows Operating Systems
Why do I need to maintain my home PC?
As with most types of equipment, you must perform periodic maintenance on your home PC to keep it in good operating condition. Performing maintenance will help your PC run faster, use resources more efficiently, and could save you from headaches caused by system failures and degradation. Most importantly, proper PC maintenance is crucial in order to protect your machine from security threats such as worms, viruses and other malicious activity.
How do I keep my home PC maintained?
Note: The following steps are provided to help ensure that your home PC operates effectively and securely. Most of the tips can be performed with moderate knowledge of PCs and can generally be completed in a short time. More detailed, in-depth assistance may be required in some instances, in which case you may wish to consult a qualified computer repair professional.
§ Establish and maintain a plan. Make a plan to perform periodic maintenance and put it on your calendar as a reminder. Back up critical files system files and programs before beginning.
§ Set a System Restore Point. Before you begin your periodic maintenance or make any significant changes, set up a system restore point, which will enable recovery from any error that may occur during maintenance. To set a System Restore Point, click Start, All Programs, Accessories, System Tools, System Restore, Create a Restore Point. (For “Classic” Start Menu: click Start, Programs, Accessories, System Tools, System Restore, Create a Restore Point.)
§ Remove unnecessary files or programs. Empty your Recycle Bin and delete Windows temporary files. Remove installed programs that you no longer use. The Disk Cleanup program does all of these tasks including the deletion of unneeded Windows components. To access the Windows Disk Cleanup program, click: Start, All Programs, Accessories, System Tools, Disk Cleanup. (For “Classic” Start Menu, click: Start, Programs, Accessories, System Tools, Disk Cleanup.) In Internet Explorer, clear your history, temporary Internet files, and cookies by clicking on Tools, Internet Options and select the tab labeled “General.” Click on the Delete button under the section labeled “Browsing history.”
Finally, archive or delete old files such as documents, images and graphics that are no longer needed.
§ Optimize system performance. Configuring your PC software to operate as efficiently as possible will help your PC run faster and smoother. Organize your data files in a central folder with appropriate subfolders (do not save files in the root directory or on the desktop). This makes backup easier and can reduce fragmentation on your hard drive.
§ Run a defragment tool on your disk drive. To do so, click Start, All Programs, Accessories, System Tools, Disk Defragmenter. (For “Classic” Start Menu, click Start, Programs, Accessories, System Tools, Disk Defragmenter.)
§ Apply updates and patches. Make sure your operating system and software applications have the latest updates installed—and that the auto-update feature is enabled. Ensure that your anti-virus/anti-spyware/anti-adware software are running and receiving automatic updates. Check vendor and manufacturer websites for device drivers updates, and apply patches as needed. Renew all maintenance contracts/subscriptions.
§ Perform regular backups. All critical files, as well as any information not easily replaced should be backed up. Check backup functions to ensure they are operating properly. Back up your files to a remote location (external hard drive or PC).
§ Check your firewall. Review firewall settings for product configurations. Confirm that settings are appropriate for the current level of security needed.
§ Routinely change your passwords. Routinely change all of your passwords for local applications, as well as those used for websites. Use strong passwords with at least eight characters and incorporate a mix of numbers, special characters, and upper and lower case letters.
§ Perform hardware inspections. Perform a visual check of your PC hardware to prevent potential problems before they occur. This includes examining your surge suppressor, UPS, power strip, and cables for any damage. Replace batteries as needed.
· Multi-State Information Sharing and Analysis Center Cyber Security Tips Newsletter - http://www.msisac.org/awareness/news/2008-03.cfm
· Small Business Computing - http://www.smallbusinesscomputing.com/testdrive/article.php/3864116/7-Basic-Windows-PC-Maintenance-Tips.htm
· Tips4PC - http://www.tips4pc.com/articles/computer%20maintenance/computer_maintenance_checklis_tips.htm· Sensible-Computer-Help - http://www.sensible-computer-help.com/computer-maintenance-tips.html
· Microsoft - http://www.microsoft.com/athome/setup/maintenance.aspx
For more monthly cyber security newsletter tips visit: www.msisac.org/awareness/news/
The above information is from tips provided by the Multi-State Information and Analysis Center (MS-ISAC). To learn more about MS-ISAC go to http://www.msisac.org/
MORE NEWS AND INFORMATION:
What is Information Security?
Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly. More companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing.
The 2010 Information Security Summit features 2 days of talks, presentations, hands-on workshops, and a vendor trade-show fair. Information Security Technology, Business/Management, Law Enforcement and Legal issues are featured.
The conference will take place October 14-15, 2010 at Corporate College East in Warrensville Heights, Ohio. Corporate College East is located at 4400 Richmond Road between Harvard and Emery Roads In Warrensville Heights. The facility is easily accessible from Interstate 271
Coalition Formed to Tackle Bank Account Scams
BY Marcia Savage, Site Editor
Search Financial Security. com
"A coalition of banks, financial trade associations, federal regulators, and law enforcement agencies is studying a variety of best practices and technologies to thwart the criminal hijacking of accounts and other bank account scams."
Demystifying Governance, Risk, Compliance
BY David Schneier
Information Security Magazine June 2010
Registration required for access to full article.
GRC aims to bring together disparate compliance efforts in the enterprise, but the concept has been stymied by a lack of clarity. Developing a GRC program requires three key steps.